DataMuseum.dk

Presents historical artifacts from the history of:

ICL Comet 32

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about ICL Comet 32

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download

⟦97fa06a03⟧ TextFile

    Length: 1538 (0x602)
    Types: TextFile
    Notes: UNIX file
    Names: »makekey.8«

Derivation

└─⟦26887b7e0⟧ Bits:30009717 Comet 32 harddisk image
    └─⟦28c352965⟧ »/a« UNIX Filesystem
        └─⟦this⟧ »usr/man/man8/makekey.8« 

TextFile

.ig
	@(#)makekey.8	2.1	7/1/84
	@(#)Copyright (C) 1983 by National Semiconductor Corp.
..
.TH MAKEKEY 8
.SH NAME
makekey \- generate encryption key
.SH SYNOPSIS
.B /usr/lib/makekey
.SH DESCRIPTION
.I Makekey
improves the usefulness of encryption schemes depending on a key by
increasing the amount of time required to search the key space.  It
reads 10 bytes from its standard input, and writes 13 bytes on its
standard output.  The output depends on the input in a way intended to
be difficult to compute (i.e. to require a substantial fraction of a
second).
.PP
The first eight input bytes
(the
.IR "input key" )
can be arbitrary ASCII characters.
The last 
two (the
.IR salt )
are best chosen from the set of digits, upper- and lower-case
letters, and `.' and `/'.
The salt characters are repeated as the first two characters of the output.
The remaining 11 output characters are chosen from the same set as the salt
and constitute the
.I "output key."
.PP
The transformation performed is essentially the following:
the salt is used to select one of 4096 cryptographic
machines all based on the National Bureau of Standards
DES algorithm, but modified in 4096 different ways.
Using the input key as key,
a constant string is fed into the machine and recirculated
a number of times.
The 64 bits that come out are distributed into the
66 useful key bits in the result.
.PP
.I Makekey
is intended for programs that perform encryption
(e.g.
.I ed
and
.IR crypt (1)).
Usually its input and output will be pipes.
.SH SEE ALSO
crypt(1), ed(1)